After spotting some interesting military phones at a museum, [CuriousMarc] wondered what it would take to retrofit these heavy duty pieces of telecom equipment for civilian use. He knew most of the internals would be a lost cause, but reasoned that if he could reverse engineer key elements such as the handset and keypad, he might be able to connect them to the electronics of a standard telephone. Luckily for us, he was kind enough to document the process.
There were a number of interesting problems that needed to be solved, but the first and perhaps largest of them was the unusual wiring of the keypad. It wasn’t connected in the way modern hackers like us might expect, and [CuriousMarc] had to end up doing some pretty significant rewiring. By cutting the existing traces on the PCB with a Dremel and drilling new holes to run his wires around the back, he was able to convert it over to a wiring scheme that contemporary touch tone phones could use.
An adapter needed to be fabricated to mount a basic electret microphone in place of the original dynamic one, but the original speaker was usable. He wanted to adapt the magnetic sensor that detected when the handset was off the hook, but in the end it was much easier to just drill a small hole and use a standard push button.
The main board of the phone is a perfect example of the gorgeous spare-no-expense construction you’d expect from a military communications device, but unfortunately it had to go in the bin. In its place is the guts of a lowly RCA phone that was purchased for the princely sum of $9.99. [CuriousMarc] won’t be able to contact NORAD anymore, but at least he’ll be able to order a pizza. The red buttons on the keypad, originally used to set the priority level of the call on the military’s AUTOVON telephone network, have now been wired to more mundane features of the phone such as redial.
While this is fine for a one-off project, we’d love to see a drop-in POTS or VoIP conversion for these phones that didn’t involve so much modification and rewiring. Now that we have some documentation for things like the keypad and hook sensor, it shouldn’t be hard to take their idiosyncrasies into account with a custom PCB. Dragging vintage gear into the modern era is always a favorite pastime for hackers, so maybe somebody out there will be inspired to take on the challenge.
Continue reading “House Training A Military TA-1024A Field Telephone” →
16-button keypads have a clever method of encoding their data into 8 pins. Pins are mapped to four rows and four columns on the keypad. A user reads the keypad by bringing each row up to logic: HIGH, and reading the corresponding column values, (HIGH or LOW). Keypad scanning can be farmed out to a microcontroller with a simple finite-state machine and some button debouncing techniques. [Mario], [Glen], and [Paul] on the Netduino forums took an entirely different route: they’ve designed and implemented a Keypad Scanner using any microcontrollers SPI peripheral and a 74HC595 Shift register.
The trio’s solution is an elegant adventure into circuit design. With two diodes and a voltage divider, they devise a simple circuit that pulls the SPI MISO line LOW if a button in the corresponding circuit’s row is pushed closed. Copied four-fold, this circuit joins the rows and columns of the 74HC595 to the keypad matrix. To scan across the four columns, the microcontroller performs an SPI transfer of the key value: 0x01. To decode which button is pushed, the value received back from the SPI bus encodes which button was pushed out of the 16 possible buttons. Note: some cases for ambiguity as to “which button was pressed” do exist if multiple buttons are pushed at the same time, but for the general case where we’re punching in values one-by-one, this circuit works perfectly.
The team’s hack is a clever use of existing hardware to outsource a microcontroller’s software problem to hardware while leveraging the SPI peripheral to cleverly decrypt and retrieve data back from the keypad. Kudos to the team of three over at the Netduino Forums, and we’re always thrilled to see and idea grow from one person to the next. In case you want to take a step lower and build up the keypad itself, here’s a blast from the past that does just that.
Hackaday reader [Oneironaut] wrote in to share a modular, portable security system he built for himself.
He likes visiting the Caribbean, but his favorite vacation spot is apparently rife with cat burglars. He enjoys sleeping with the windows open and wanted to find a way to scare off ne’er do wells. At home, there are a few different buildings on the property he owns, and he was looking to keep curious trespassers away.
The alarm system was built using a matrix keypad that interfaces with an ATMega88 micro controller. The micro controller handles all the logic for the system, triggering an attached “pocket alarm” when ever the sensor is tripped. Like most household alarms, it is armed and disarmed via the keypad, giving the user 60 seconds to enter the disarm code if the alarm has been mistakenly tripped. A wide array of trigger methods can be used, from mercury switches to motion detectors, since his alarm uses a simple plug interface that accepts any two-wire sensor.
Now, no one is claiming that this is high security by any means – the alarm addresses a couple of specific scenarios that apply to [Oneironaut], which may also be applicable to others out there. At the end of the day, the alarm is more meant to scare an intruder into fleeing than anything else, and in that respect, it works perfectly.
Continue reading to see a quick video demonstration of his alarm system in action.
Continue reading “Modular Security System Is Portable Too” →